Help

We accept lots of image, audio, and video formats. JPG, PNG, GIF, and MOV, Just to name a few.

Email:

This is OPTIONAL. It is not disclosed and will not be added to any lists. We use it to contact you if we have a request from someone regarding your image.

Image Credit:

Please submit images that you either own or have permission to post. We appreciate your help in upholding our 'in good faith' image submission policy. Please do not submit photos from other websites or copyrighted material without their express permission.

Year Taken / When Taken:

If you know what year an image is from, enter it in 'Year Taken'. Additionally, or if you do not know the year, 'When Taken' is free form, and can accept things like "1970's", "4th of July weekend", or "During the grand opening"

Description:

Images are searchable by keywords in the description and credit. Using words like screen, marquee, concessions building (outside), snack bar (inside), ticket booth entrance, or box office will help make your images more searchable.

Permissions:

Default permissions are to not allow use of your image. If you prefer to allow FREE use of your image (with appropriate credit), check which ones you would like to allow. If you do not want to receive requests not covered by defaults, check 'Do not contact me'

Image Submission Policy

We encourage people who are taking pictures of drive-ins to request permission from the
owner or manager. If no one is available, it is legal to take pictures from a vantage point
on public property such as a nearby road.

Images are searchable by keywords in the description and credit. Using words like screen,
marquee, concessions building (outside), snack bar (inside), ticket booth entrance, or box
office will help make your images more searchable.

The following is considered to be inappropriate:

Violating the intellectual property rights of a third party

Posing as someone else in the credit

Providing any content that contains viruses, Trojan horses,
worms, time bombs, cancelbots or other computer programming routines that are intended to damage, detrimentally interfere with,
surreptitiously intercept or expropriate any system, data or personal information